Cyber Security Insights Magazine is a quarterly publication whose primary objective is to educate readers about emerging cyber security research trends. This magazine’s goal is to highlight the latest developments in the field of cyber security.
Aim & Scope
Cybersecurity is endangered by technological advances. Indeed, the latest developments in defense practitioners’, defensive techniques feel a sense of loss. In addition, the intensity and amount of cyber threats have escalated as defensive strategies and technologies operate in a never-ending loop. Security researchers provide ample tools to protect insecure information and systems against cyber-criminals by integrating the power of machine learning, deep learning, artificial intelligence, and cryptography. It delivered instant insights after introducing such engineering, resulting in slower reaction times. Protection of data is more important than ever before. It does not guarantee that the data is breach-proof by upgrading existing cybersecurity technologies and applying any conceivable applicable protection layer. But the role of security practitioners will be eased by strong funding for advanced technologies.
This Cyber Security Insights magazine will present the emerging trends of computational intelligence and artificial intelligence in cybersecurity. The study of artificial intelligence towards security and protection, and also includes how artificial intelligence is related to cybersecurity. Also, include various security and privacy solutions using machine learning, deep learning, and artificial intelligence includes various security and data protection frameworks and cryptographic solution data hiding. This magazine published quarterly and targeted at researchers, students, academicians, and business professions in the field.
The article can be theoretical, practical, and application-oriented on the following topics but not limited to:
- Artificial intelligence
- Machine learning
- Artificial intelligence in cybersecurity
- Cybersecurity challenges
- Deep learning in cyber security
- Machine learning in cyber security
- DDoS attack
- Supervised learning
- Malware Attacks
- Security and Privacy
- Authentication, Privacy and Security Models
- Intelligent data analysis for Security
- Big data intelligence in security and privacy
- Deep Learning in security and privacy
- Identity and Trust Management
- Statistical learning for security and privacy
- Intrusion, anomaly and fraud detection
- Data-driven access control
- Secure cloud computing
- Secure multi-party computation
- Data privacy
- Sensitive data collection Privacy-preserving data mining
- Privacy-preserving data publishing
- Cloud Computing
- Distributed Computing
- Fog Computing
- Mobile Computing
- IoT security
Cyber Security Insights Magazine is a Quarterly Magazine.
- Dragan Peraković, University of Zagreb, Croatia
- Zhili Zhou, Nanjing university of information science and technology, China
- Associate Editor
- Kwok Tai Chui, The Open University of Hong Kong, Hong Kong
- Mohammed Ali, University of Manchester, UK
- Francesco Colace, University of Salerno, Italy
- Editorial Board Members
- Prof. Yuk. Ming Tang, The Hong Kong Polytechnic University, Hong Kong
- Milad Taleby Ahvanooey, Nanjing University (NJU), P.R. China
- Brij B. Gupta, National Institute of Technology Kurukshetra, India
- Sugam Sharma, Founder & CEO, eFeed-Hungers.com, USA
- Gregorio Martinez Perez, University of Murcia (UMU), Spain
- Abhay Ratnaparkhi, IBM, USA
- Sunil K. Singh, CCET (Degree Wing), Panjab University, Chandigarh, India
- Deepak Gupta, Founder and CEO, LoginRadius Inc., Canada
- Priyanka Chaurasia, Ulster University, Magee campus, Londonderry, UK
- Francisco José García-Peñalvo, University of Salamanca, Spain
- Konstantinos Psannis, University of Macedonia, Greece
- Phuc Do, University of Information Technology, Vietnam
- Articles should be comprehensible to a diverse audience of readers seeking knowledge to utilize in their everyday job. Writing should be straightforward, practical, unique, and understandable to all readers, regardless of their field of expertise. Assume nothing about your audience’s expertise in any single topic.
- The length of the article should be around 2500-4000 words (excluding references). Use of concise, clear, coherent, and error-free language is highly recommended.
- The article provides “Conceptual Ideas or Knowledge” on the topic by including quality technical information.
- References should be included only to guide readers to more information on the topic; the reference list should not include every available source. A limit of 15 archival references is recommended.
- Article must contain at least 4 keywords that should closely reflect your article topic.
- Figures and tables should be limited to a combined total of six. If the article exceeds these recommended limits, contact the Editor-in-chief.
- It is the author’s obligation to get permission to print and publish figures in our digital collection. If the author did not produce the figure, he or she must get permission from the image’s owner.
- Submit the figure (300 dpi) along with the article.
- Prepare your paper according to the Word Template, or Latex Template
We solicit peer reviews from at least two researchers. Reviewers are assigned to manuscripts based on their expertise. Reviews are used as the basis for acceptance and content revisions. The editor-in-chief makes the final decision regarding publication.
- Articles submitted must be published under the Insights2Techinfo copyright.
- Author needs to submit the copyright form at the time of final acceptance of the paper.
Submit Your Paper
- Store the paper (world of latex source files) and images (300 dpi) in one folder (.zip).
- Fill the submission form and upload the .zip folder.
All questions about submissions should e-mail to; email@example.com